A <span class="c11 g0">nodespan> includes a <span class="c15 g0">firstspan> <span class="c30 g0">portspan> <span class="c31 g0">configuredspan> to be selectively blocked and unblocked; a second <span class="c30 g0">portspan> <span class="c31 g0">configuredspan> to be selectively blocked and unblocked; a forwarder between the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan>; a <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> between the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan>, wherein the selective blocking and unblocking of the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan> is based on the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan>; and a <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> between the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan>, wherein the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> utilizes an <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>. A method can include operating a <span class="c17 g0">ringspan> with <span class="c17 g0">ringspan> Protection Switching comprising a <span class="c5 g0">forwardingspan> <span class="c6 g0">mechanismspan> and a blocking <span class="c6 g0">mechanismspan> that are independent and decoupled entities therebetween, wherein the <span class="c17 g0">ringspan> includes a <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> and a <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> that each <span class="c4 g0">utilizespan> an <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>.
|
1. A <span class="c11 g0">nodespan>, comprising:
a <span class="c15 g0">firstspan> <span class="c30 g0">portspan> <span class="c31 g0">configuredspan> to be selectively blocked and unblocked;
a second <span class="c30 g0">portspan> <span class="c31 g0">configuredspan> to be selectively blocked and unblocked;
a forwarder between the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan>;
a <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> between the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan>, wherein the selective blocking and unblocking of the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan> is based on the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan>; and
a <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> between the <span class="c15 g0">firstspan> <span class="c30 g0">portspan> and the second <span class="c30 g0">portspan>, wherein the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> utilizes an <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>;
wherein the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> and the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> are separated into <span class="c9 g0">differentspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> name spaces with a <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> for the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> being a <span class="c9 g0">differentspan> <span class="c12 g0">typespan> from the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> for the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan>, wherein <span class="c26 g0">gspan>.8032 protection is provided on the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> <span class="c25 g0">usingspan> the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>, wherein the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> is a non-<span class="c16 g0">virtualspan> Local Area network (VLAN) <span class="c1 g0">identifierspan> for blocking and unblocking on the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> <span class="c25 g0">usingspan> the <span class="c26 g0">gspan>.8032 protection.
17. A method, comprising:
operating a <span class="c17 g0">ringspan> with <span class="c26 g0">gspan>.8032 <span class="c17 g0">ringspan> Protection Switching comprising a <span class="c5 g0">forwardingspan> <span class="c6 g0">mechanismspan> and a blocking <span class="c6 g0">mechanismspan> that are independent and decoupled entities there between, wherein the <span class="c17 g0">ringspan> comprises a <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> and a <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> that each <span class="c4 g0">utilizespan> an <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>, and wherein the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> and the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> are separated into <span class="c9 g0">differentspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> name spaces with a <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> for the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan> being a <span class="c9 g0">differentspan> <span class="c12 g0">typespan> from the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> for the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan>, wherein <span class="c26 g0">gspan>.8032 <span class="c17 g0">ringspan> Protection Switching is provided on the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> <span class="c25 g0">usingspan> the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>, wherein the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> is being a non-<span class="c16 g0">virtualspan> Local Area network (VLAN) <span class="c1 g0">identifierspan> for blocking and unblocking on the <span class="c18 g0">dataspan> <span class="c21 g0">channelspan> <span class="c25 g0">usingspan> <span class="c26 g0">gspan>.8032 <span class="c17 g0">ringspan> Protection Switching;
detecting a <span class="c7 g0">failurespan> <span class="c8 g0">affectspan> a <span class="c17 g0">ringspan> span;
installing <span class="c21 g0">channelspan> blocks adjacent to the <span class="c7 g0">failurespan>;
transmitting fault indication messages on the <span class="c17 g0">ringspan>;
upon receiving the fault indication messages, removing any <span class="c21 g0">channelspan> blocks on the <span class="c17 g0">ringspan> besides the <span class="c21 g0">channelspan> blocks adjacent to the <span class="c7 g0">failurespan>.
16. A network, comprising:
a plurality of <span class="c10 g0">interconnectedspan> nodes forming one of a <span class="c19 g0">logicalspan> <span class="c17 g0">ringspan> and a physical <span class="c17 g0">ringspan>;
a <span class="c15 g0">firstspan> <span class="c16 g0">virtualspan> <span class="c17 g0">ringspan> on the plurality of <span class="c10 g0">interconnectedspan> nodes, wherein the <span class="c15 g0">firstspan> <span class="c16 g0">virtualspan> <span class="c17 g0">ringspan> comprises a <span class="c13 g0">bearerspan> <span class="c21 g0">channelspan> and a <span class="c26 g0">gspan>.8032 <span class="c17 g0">ringspan> automatic protection switching (R-APS) <span class="c21 g0">channelspan>, and wherein the <span class="c13 g0">bearerspan> <span class="c21 g0">channelspan> and the R-APS <span class="c21 g0">channelspan> each use a <span class="c9 g0">differentspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> <span class="c2 g0">spacespan>; and
a <span class="c15 g0">firstspan> selectively enabled <span class="c21 g0">channelspan> <span class="c14 g0">blockspan> on the <span class="c15 g0">firstspan> <span class="c16 g0">virtualspan> <span class="c17 g0">ringspan>;
wherein each of the plurality of <span class="c10 g0">interconnectedspan> nodes comprise a <span class="c5 g0">forwardingspan> <span class="c6 g0">mechanismspan>, and wherein the <span class="c5 g0">forwardingspan> <span class="c6 g0">mechanismspan> is independent of the <span class="c15 g0">firstspan> selectively enabled <span class="c21 g0">channelspan> <span class="c14 g0">blockspan>; and
wherein the R-APS <span class="c21 g0">channelspan> and the <span class="c13 g0">bearerspan> <span class="c21 g0">channelspan> are separated into <span class="c9 g0">differentspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> name spaces with a <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> for the the R-APS <span class="c21 g0">channelspan> being a <span class="c9 g0">differentspan> <span class="c12 g0">typespan> from the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> for the <span class="c13 g0">bearerspan> <span class="c21 g0">channelspan>, wherein <span class="c26 g0">gspan>.8032 <span class="c17 g0">ringspan> automatic protection switching is provided on the <span class="c13 g0">bearerspan> <span class="c21 g0">channelspan> <span class="c25 g0">usingspan> the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan>, wherein the <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> <span class="c1 g0">identifierspan> is a non-<span class="c16 g0">virtualspan> Local Area network (VLAN) <span class="c1 g0">identifierspan> for blocking and unblocking on the <span class="c13 g0">bearerspan> <span class="c21 g0">channelspan> <span class="c25 g0">usingspan> the <span class="c26 g0">gspan>.8032 <span class="c17 g0">ringspan> automatic protection switching.
2. The <span class="c11 g0">nodespan> of
3. The <span class="c11 g0">nodespan> of
4. The <span class="c11 g0">nodespan> of
5. The <span class="c11 g0">nodespan> of
6. The <span class="c11 g0">nodespan> of
7. The <span class="c11 g0">nodespan> of
8. The <span class="c11 g0">nodespan> of
9. The <span class="c11 g0">nodespan> of
10. The <span class="c11 g0">nodespan> of
circuitry to detect a <span class="c7 g0">failurespan> associated with one of the plurality of <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> identifiers based on monitoring the <span class="c20 g0">managementspan> <span class="c21 g0">channelspan>;
wherein the <span class="c16 g0">virtualspan> <span class="c5 g0">forwardingspan> instance is <span class="c31 g0">configuredspan> to remove <span class="c5 g0">forwardingspan> entries associated with the one of the plurality of <span class="c3 g0">arbitraryspan> <span class="c0 g0">servicespan> identifiers upon detection of the <span class="c7 g0">failurespan>.
11. The <span class="c11 g0">nodespan> of
12. The <span class="c11 g0">nodespan> of
13. The <span class="c11 g0">nodespan> of
14. The <span class="c11 g0">nodespan> of
15. The <span class="c11 g0">nodespan> of
18. The method of
19. The method of
20. The method of
|
Generally, the field of art of the present disclosure pertains to networking systems and methods, and more particularly, to generalized service protection systems and methods.
Conventionally, G.8032 Ethernet Ring Protection is an Ethernet shared ring protection technology analogous to Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) rings. Of note, G.8032 is defined in ITU-T G.8032 Ethernet Ring Protection Switching (March 2010), ITU-T G.8032 Amendment 1 (June 2010), and ITU-T G.8032 Amendment 2 (February 2011), the contents of each is incorporated by reference herein. With SONET/SDH rings, timeslots are used as a data plane forwarding identifier, and with G.8032, Ethernet frame Virtual Local Area Network (VLAN) Identifier (VID) and Destination Media Access Control Address (MAC DA) are used as the data plane identifier. As specified, the G.8032 protocol is applicable to bearer traffic that is based on the VID service space identification. Consequently, G.8032, as specified, can only be applied to IEEE 802.1Q Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks (2003, 2005, 2008, and 2011) (or amendment [IEEE 802.1ad Provider Bridges (2005), 802.1ah Provider Backbone Bridges (2008)]) bearer plane technologies. The contents of IEEE 802.1Q, 802.1ad, and 802.1ah are each incorporated by reference herein. Disadvantageously, G.8032 being only applicable to IEEE 802.1Q or amendments thereof is limiting application of protection switching to other bearer traffic technologies.
In an exemplary embodiment, a node includes a first port configured to be selectively blocked and unblocked; a second port configured to be selectively blocked and unblocked; a forwarder between the first port and the second port; a management channel between the first port and the second port, wherein the selective blocking and unblocking of the first port and the second port is based on the management channel; and a data channel between the first port and the second port, wherein the data channel utilizes an arbitrary service identifier. The forwarder can include circuitry configured to forward bearer traffic on the data channel based on Ethernet forwarding logic. The forwarder can include circuitry or an optical device configured to forward bearer traffic on the data channel utilizing a non-learning forwarding paradigm. The arbitrary service identifier can be different from a service identifier associated with the management channel. The arbitrary service identifier can include any of Provider Backbone Bridging Backbone Service Instance Identifier (PBB I-SID), Ethernet Virtual Local Area Network (VLAN) identifier and/or tag priority bits, Multiprotocol Label Switching (MPLS) label identifier, Internet Protocol (IP) Differentiated Services Code Point (DSCP), EtherType value, Generic Framing Protocol (GFP) protocol identifier (PID), Time Division Multiplexing (TDM) bearer traffic identifiers, Optical Transport Network (OTN) service identifiers, wavelength identifiers, and a combination thereof.
The selective blocking and unblocking of the first port and the second port can be based on the arbitrary service identifier. The forwarder can be configured to forward traffic on both the management channel and the data channel based on a plurality of arbitrary service identifiers. The forwarder can be configured with a virtual forwarding instance per arbitrary service identifier. The virtual forwarding instance can conform to an IEEE 802.1Q forwarding process. The node can further include circuitry to detect a failure associated with one of the plurality of arbitrary service identifiers based on monitoring the management channel; wherein the virtual forwarding instance is configured to remove forwarding entries associated with the one of the plurality of arbitrary service identifiers upon detection of the failure. The virtual forwarding instance can be configured to relearn forwarding entries associated with the one of the plurality of arbitrary service identifiers upon the removal of the forwarding entries. The forwarder can be configured with a non-learning based forwarding system that forwards data between the first port and the second port based on predetermined rules. The forwarder can include one of an optical routing device, an electrical Time Division Multiplexing (TDM) switch fabric, and a packet switch where learning is disable effectively resulting in all received frames being forwarded out all associated egress ports. The data channel and the management channel can be separated therebetween into different instances of a same service identifier name space. The data channel and the management channel can be separated therebetween into different service identifier name spaces. The node can operate Ethernet Ring Protection Switching with the data channel utilizing a different service identifier than the management channel.
In another exemplary embodiment, a network includes a plurality of interconnected nodes forming one of a logical ring and a physical ring; a first virtual ring on the plurality of interconnected nodes, wherein the first virtual ring includes a bearer channel and a ring automatic protection switching (R-APS) channel, and wherein the bearer channel and the R-APS channel each use a different service identifier space; and a first selectively enabled channel block on the first virtual ring; wherein each of the plurality of interconnected nodes include a forwarding mechanism, and wherein the forwarding mechanism is independent of the first selectively enabled channel block.
In yet another exemplary embodiment, a method includes operating a ring with Ring Protection Switching including a forwarding mechanism and a blocking mechanism that are independent and decoupled entities therebetween, wherein the ring includes a management channel and a data channel that each utilize an arbitrary service identifier; detecting a failure affect a ring span; installing channel blocks adjacent to the failure; transmitting fault indication messages on the ring; upon receiving the fault indication messages, removing any channel blocks on the ring besides the channel blocks adjacent to the failure.
Exemplary and non-limiting embodiments of the present disclosure are illustrated and described herein with reference to various drawings, in which like reference numbers denote like method steps and/or system components, respectively, and in which:
In various exemplary embodiments, generalized service protection systems and methods are disclosed enabling aspects of the G.8032 control protection protocol to be applied to other bearer plane technologies, such as, but not limited to, Multiprotocol Label Switching (MPLS), Optical Transport Network (OTN), Time Division Multiplexing (TDM), Internet Protocol (IP), etc. That is, the generalized service protection systems and methods support variants to the G.8032 protocol for service identifiers in an arbitrary address space (e.g., MPLS labels, IP Differentiated Services Code Point (DSCP), EtherTypes, OTN service identifiers, TDM bearer traffic identifiers, etc.). The generalized service protection systems and methods allow systems and methods similar to the G.8032 protocol to be applied to bearer traffic based on OTN traffic, SONET/SDH traffic, MPLS traffic, IP traffic, etc. That is, generally any traffic based on non-VID space identifiers. Various protection switching performance attributes of G.8032 (e.g., sub-50 ms protection switching) applied to these arbitrary bearer traffic types are retained. Thus, the generalized service protection systems and methods extend/abstract the G.8032 protocol to provide blocking/unblocking of bearer traffic on a ring (i.e., physical or logical) using an arbitrary service address space.
Referring to
Ethernet Ring Protection Switching forms an active ring topology in the network 10 by dynamic and managed configuration of forwarding table entries at each of the nodes 12, such as through the control entity 20 and/or the bridge relay 18. Ethernet Ring Protection Switching includes a control protocol (e.g., G.8032 ring automatic protection switching (R-APS) Protocol Data Units (PDUs)). The PDUs are persistently transmitted over the network 10 to convey ring status/state and control ring port blocking/unblocking to facilitate loop prevention and protection switching thereon. From a standards perspective, IEEE 802.3 MAC can be used at Layer 2, IEEE 802.1Q and amendment (e.g., 802.1ad, 802.1ah) for bridging of traffic, and Operations, Administration, and Maintenance (OAM) frames (e.g., IEEE 802.1ag “Connectivity Fault Management” (September 2007), ITU-T Y.1731, etc.) to control the network 10. Each of the nodes 12 forward traffic based upon standard 802.1Q forwarding logic (based on VID/MAC) that is (somewhat) independent of protection switching mechanism. Specifically, this forwarding can be based on VLAN tags. This forwarding can be performed by the bridge relay 18.
By virtue of the nodes 12 being interconnected in a closed loop architecture, the nodes 12 can be allowed to collectively run a separate control plane to control how data is passed between the nodes 12 on the ring. The control plane on the closed loop selects one of the nodes 12 to be a root node to provide for blocking of traffic flowing on the ring. This prevents traffic from endlessly looping on the ring. Additionally, the control plane provides for failure detection on the closed loop, notification of the failure to the nodes 12 on the closed loop, and how connectivity can be restored to enable the closed loop to recover from failure. One aspect of the control protocol is that, upon failure in the closed loop, a fault indication message is transmitted on the ring. The fault indication message, amongst other things, causes the bridging nodes 12 on the ring to flush their forwarding databases associated with the ring, so that the nodes can re-learn MAC addresses on the ring. In the network 10, protection switching and loop prevention is supported via port blocking/unblocking functions and active ring topology discovery/rediscovery functions. Note, active ring topology discovery/rediscovery may be supported by forwarding database learning, forwarding, and entry cleansing procedures. The network 10 also includes monitoring of the ring server layer (e.g., physical layer) to discovery Signal Failure (SF) conditions to trigger protection switching providing protection and recovery switching within 50 ms.
Referring to
Referring to
Referring to
Referring to
Referring to
In this exemplary embodiment of a generalized/arbitrary identification space and forwarding based on IEEE 802.1Q bridging, the G.8032 protocol can be abstracted to support the transport and protection of service traffic with an arbitrary service identification space. The following abstractions/modifications are necessary for the generalized service protection systems and methods. First, service and control flows being transported over the ring 50 can be identified based upon a unique identifier within the packet. Exemplary unique identifiers can include Provider Backbone Bridging Backbone Service Instance Identifier (PBB I-SID), Ethernet VLAN identifier and/or tag priority bits, MPLS label identifier, IP DSCP, EtherType value, Generic Framing Protocol (GFP) protocol identifier (PID), a combination of the aforementioned, and the like. Second, the generalized service protection systems and methods support blocking/unblocking of bearer and R-APS traffic channels 38A, 38B, 40A, 40B, 40C based upon the respective service identifier.
Third, the generalized service protection systems and methods support forwarding of bearer and R-APS traffic over the ring 50 based upon service identifier that is possibly different from the service identifier used for blocking/unblocking. For example, a virtual forwarding instance (VFI) is created per service identifier (grouping), and each VFI conforms to an IEEE 802.1Q forwarding process. Fourth, the generalized service protection systems and methods support cleansing/removal of forwarding entries associated with a VFI associated with the service identifier. Fifth, the generalized service protection systems and methods support initiation of relearning of forwarding entries associated with a VFI associated with the service identifier. Sixth, the generalized service protection systems and methods support separation of bearer and R-APS traffic into different instances of the same service identifier name space, or different service identifier name spaces.
Referring to
Referring to
Referring to
Referring to
The following abstractions/modifications are necessary for the generalized service protection systems and methods with forwarding based on a “non-learning” forwarding paradigm. First, service flows being transported over the ring 50 can be identified based upon any unique identifier. Exemplary unique identifiers can include PBB I-SID, Ethernet VLAN tag priority bits, MPLS label identifier, IP DSCP, EtherType value, GFP PID, a wavelength identifier, a combination of the aforementioned, and the like. Second, the generalized service protection systems and methods support blocking/unblocking of bearer and R-APS traffic channel based upon service identifier. Third, the generalized service protection systems and methods support forwarding of bearer and R-APS traffic over the ring based upon service identifier. Fourth, the generalized service protection systems and methods support separation of bearer and R-APS traffic into different instances of the same service identifier name space, or different service identifier name spaces.
Referring to
In this exemplary embodiment of a generalized/arbitrary identification space and forwarding based on a “non-learning” forwarding paradigm, the G.8032 protocol can be abstracted to support the transport and protection of service traffic with an arbitrary service identification space. As described herein the “non-learning” forwarding paradigm can include an optical splitter, electrical TDM, a packet switch with learning disabled, and the like. Each of the foregoing has forwarding based that is non-learning in an Ethernet sense. For example, the packet switch with learning disabled effectively results in all received frames being forwarded out all egress ports associated with a service, or forwarding is configured to send packets to specific ports depending on the value of the service identifier. Similarly, an optical splitter sends all traffic split out over the output ports, an electrical TDM switch sends all traffic in a connection out its egress, and the like. Non-learning can mean data is forwarded based on predetermined rules, i.e., the rules are fixed and not adjusted or learned over time. Specifically, the forwarder 152 can be configured to route, switch, send, etc. traffic between the ports 150, 154 based on the predetermined rules.
Referring to
In an exemplary embodiment, the forwarding based on a “non-learning” forwarding paradigm can be described as an all-broadcast system where each node 12 is configured to broadcast everything received on one port 150 to the second port 154. The channel block 52 is meant to prevent a loop in the ring 50. That is, the all-broadcast system cannot have a loop because it will cause traffic to interfere if it loops back upon itself, i.e. whether the traffic is optical wavelengths, TDM frames, or packets. Thus, this exemplary embodiment can be viewed as placing and removing the channel block based on failures to enable recovery. That is, the activity in this exemplary embodiment is focused on the ports 150, 154, and not on the forwarder 152. The forwarder 152 does not have to flush or cleanse forwarding databases. Rather, the forwarder 152 works per normal operation under all circumstances with the channel blocks 52 being used to provide the Ring Protection Switching.
Referring to
Referring to
Referring to
Referring to
Two exemplary blades are illustrated with line blades 302 and control blades 304. The line blades 302 generally include data ports 308 such as a plurality of Ethernet ports. For example, the line blade 302 can include a plurality of physical ports disposed on an exterior of the blade 302 for receiving ingress/egress connections. Additionally, the line blades 302 can include switching components to form a switching fabric via the backplane 306 between all of the data ports 308 allowing data traffic to be switched between the data ports 308 on the various line blades 302. The switching fabric is a combination of hardware, software, firmware, etc. that moves data coming into the node 12A out by the correct port 308 to the next node 12. “Switching fabric” includes switching units, or individual boxes, in a node; integrated circuits contained in the switching units; and programming that allows switching paths to be controlled. Note, the switching fabric can be distributed on the blades 302, 304, in a separate blade (not shown), or a combination thereof.
Within the context of the generalized service protection systems and methods, the control blades 304 include a microprocessor 310, memory 312, software 314, and a network interface 316. Specifically, the microprocessor 310, the memory 312, and the software 314 can collectively control, configure, provision, monitor, etc. the node 12A. The network interface 316 may be utilized to communicate with an element manager, a network management system, etc. Additionally, the control blades 304 can include a database 320 that tracks and maintains provisioning, configuration, operational data and the like. The database 320 can include a forwarding database (FDB) 322 that is adjusted as described herein. In this exemplary embodiment, the node 12A includes two control blades 304 which may operate in a redundant or protected configuration such as 1:1, 1+1, etc. In general, the control blades 304 maintain dynamic system information including Layer two forwarding databases, protocol state machines, and the operational status of the ports 308 within the network element 12A. In an exemplary embodiment, the blades 302, 304 are configured to implement a G.8032 ring, such as the ring 50, and to implement the various processes, algorithms, methods, mechanisms, etc. described herein for implementing G.8032 like Ring Protection with a generalized/arbitrary identification space and forwarding based on IEEE 802.1Q bridging or forwarding based on a “non-learning” forwarding paradigm.
Referring to
In an exemplary embodiment, the node 12B includes common equipment 310, one or more line modules 320, and one or more switch modules 330. The common equipment 310 can include power; a control module; operations, administration, maintenance, and provisioning (OAM&P) access; and the like. The common equipment 310 can connect to a management system such as a network management system (NMS), element management system (EMS), or the like. The node 12B can include an interface 370 for communicatively coupling the common equipment 310, the line modules 320, and the switch modules 330 therebetween. For example, the interface 370 can be a backplane, mid-plane, a bus, optical or electrical connectors, or the like. The line modules 320 are configured to provide ingress and egress to the switch modules 330 and external to the node 12B. In an exemplary embodiment, the line modules 320 can form ingress and egress switches with the switch modules 330 as center stage switches for a three-stage switch, e.g., a three stage Clos switch. The line modules 320 can include optical transceivers, such as, for example, 1 Gb/s (GbE PHY), 2.5 Gb/s (OC-48/STM-1, OTU1, ODU1), 10 Gb/s (OC-192/STM-64, OTU2, ODU2, 10 GbE PHY), 40 Gb/s (OC-768/STM-256, OTU3, ODU3, 40 GbE PHY), 100 Gb/s (OTU4, ODU4, 100 GbE PHY), etc. The line modules 320 can also be all-optical ports for interface to an all-optical switch module 330.
Further, the line modules 320 can include a plurality of optical connections per module and each module may include a flexible rate support for any type of connection, such as, for example, 155 Mb/s, 622 Mb/s, 1 Gb/s, 2.5 Gb/s, 10 Gb/s, 40 Gb/s, and 100 Gb/s. The line modules 320 can include wavelength division multiplexing interfaces, short reach interfaces, and the like, and can connect to other line modules 320 on remote network elements, end clients, edge routers, and the like. From a logical perspective, the line modules 320 provide ingress and egress ports to the node 12B, and each line module 320 can include one or more physical ports. The switch modules 330 are configured to switch channels, timeslots, tributary units, wavelengths, etc. between the line modules 320. For example, the switch modules 330 can provide wavelength granularity (Layer 0 switching), SONET/SDH granularity such as Synchronous Transport Signal-1 (STS-1) and variants/concatenations thereof (STS-n/STS-nc), Synchronous Transport Module level 1 (STM-1) and variants/concatenations thereof, Virtual Container 3 (VC3), etc.; OTN granularity such as Optical Channel Data Unit-1 (ODU1), Optical Channel Data Unit-2 (ODU2), Optical Channel Data Unit-3 (ODU3), Optical Channel Data Unit-4 (ODU4), Optical Channel Data Unit-flex (ODUflex), Optical channel Payload Virtual Containers (OPVCs), etc.; Ethernet granularity; Digital Signal n (DSn) granularity such as DS0, DS1, DS3, etc.; and the like. Specifically, the switch modules 330 can include both Time Division Multiplexed (TDM) (i.e., circuit switching) and packet switching engines. The switch modules 330 can include redundancy as well, such as 1:1, 1:N, etc.
Those of ordinary skill in the art will recognize the nodes 12A, 12B can include other components which are omitted for illustration purposes, and that the systems and methods described herein are contemplated for use with a plurality of different nodes with the nodes 12A, 12B presented as an exemplary type of node. For example, in another exemplary embodiment, a node may not include the switch modules 330, but rather have the corresponding functionality in the line modules 320 (or some equivalent) in a distributed fashion. For the nodes 12A, 12B, other architectures providing ingress, egress, and switching therebetween are also contemplated for the systems and methods described herein. In general, the systems and methods described herein contemplate use with any node providing switching or forwarding of channels, timeslots, tributary units, wavelengths, etc.
It will be appreciated that some exemplary embodiments described herein may include one or more generic or specialized processors (“one or more processors”) such as microprocessors, digital signal processors, customized processors, and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the methods and/or systems described herein. Alternatively, some or all functions may be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the aforementioned approaches may be used. Moreover, some exemplary embodiments may be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer, server, appliance, device, etc. each of which may include a processor to perform methods as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory), Flash memory, and the like.
Although the present disclosure has been illustrated and described herein with reference to preferred embodiments and specific examples thereof, it will be readily apparent to those of ordinary skill in the art that other embodiments and examples may perform similar functions and/or achieve like results. All such equivalent embodiments and examples are within the spirit and scope of the present disclosure and are intended to be covered by the following claims.
Holness, Marc, Gilson, David, Shew, Stephen Daniel
Patent | Priority | Assignee | Title |
10135715, | Aug 25 2016 | Fujitsu Limited | Buffer flush optimization in Ethernet ring protection networks |
10425153, | Mar 30 2012 | Ciena Corporation | Generalized service protection systems and methods |
11310102, | Aug 02 2019 | Ciena Corporation | Retaining active operations, administration, and maintenance (OAM) sessions across multiple devices operating as a single logical device |
9813185, | Jul 10 2013 | TELEFONAKTIEBOLAGET L M ERICSSON PUBL | WDM single fiber ring protection |
Patent | Priority | Assignee | Title |
7590123, | Nov 22 2005 | Cisco Technology, Inc. | Method of providing an encrypted multipoint VPN service |
8018841, | Dec 31 2007 | CIENA LUXEMBOURG S A R L ; Ciena Corporation | Interworking an ethernet ring network and an ethernet network with traffic engineered trunks |
20090168647, | |||
20090168671, | |||
20090316571, | |||
20100094981, | |||
20100135154, | |||
20100165834, | |||
20100165883, | |||
20100260196, | |||
20100284413, | |||
20100287405, | |||
20100309821, | |||
20100322263, | |||
20110007628, | |||
20110063971, | |||
20110075554, | |||
20110075573, | |||
20110075584, | |||
20120195319, | |||
20120224471, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 22 2012 | SHEW, STEPHEN DANIEL | Ciena Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027962 | /0611 | |
Mar 27 2012 | GILSON, DAVID | Ciena Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027962 | /0611 | |
Mar 30 2012 | Ciena Corporation | (assignment on the face of the patent) | / | |||
Mar 30 2012 | HOLNESS, MARC | Ciena Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027962 | /0611 | |
Jul 15 2014 | Ciena Corporation | DEUTSCHE BANK AG NEW YORK BRANCH | SECURITY INTEREST | 033329 | /0417 | |
Jul 15 2014 | Ciena Corporation | BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENT | PATENT SECURITY AGREEMENT | 033347 | /0260 | |
Oct 28 2019 | DEUTSCHE BANK AG NEW YORK BRANCH | Ciena Corporation | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 050938 | /0389 | |
Oct 28 2019 | Ciena Corporation | BANK OF AMERICA, N A , AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 050969 | /0001 | |
Oct 24 2023 | BANK OF AMERICA, N A | Ciena Corporation | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 065630 | /0232 |
Date | Maintenance Fee Events |
Jan 08 2016 | ASPN: Payor Number Assigned. |
Feb 06 2017 | ASPN: Payor Number Assigned. |
Feb 06 2017 | RMPN: Payer Number De-assigned. |
Aug 08 2019 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 09 2023 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Feb 16 2019 | 4 years fee payment window open |
Aug 16 2019 | 6 months grace period start (w surcharge) |
Feb 16 2020 | patent expiry (for year 4) |
Feb 16 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 16 2023 | 8 years fee payment window open |
Aug 16 2023 | 6 months grace period start (w surcharge) |
Feb 16 2024 | patent expiry (for year 8) |
Feb 16 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 16 2027 | 12 years fee payment window open |
Aug 16 2027 | 6 months grace period start (w surcharge) |
Feb 16 2028 | patent expiry (for year 12) |
Feb 16 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |